{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:27:32Z","timestamp":1750746452131,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,18]],"date-time":"2013-08-18T00:00:00Z","timestamp":1376784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,18]]},"DOI":"10.1145\/2491411.2494580","type":"proceedings-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T14:07:21Z","timestamp":1377007641000},"page":"631-634","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Data debugging with continuous testing"],"prefix":"10.1145","author":[{"given":"K\u0131van\u00e7","family":"Mu\u015flu","sequence":"first","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Yuriy","family":"Brun","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Amherst, USA"}]},{"given":"Alexandra","family":"Meliou","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Amherst, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,8,18]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882375"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025139"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.28"},{"key":"e_1_3_2_1_5_1","volume-title":"Aviation Series. Pen & Sword Aviation","author":"Campbell S.","year":"2004","unstructured":"S. Campbell . Chinook Crash . Aviation Series. Pen & Sword Aviation , 2004 . S. Campbell. Chinook Crash. Aviation Series. Pen & Sword Aviation, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"VLDB","author":"Ceri S.","year":"1991","unstructured":"S. Ceri and J. Widom . Deriving production rules for incremental view maintenance . In VLDB , 1991 . S. Ceri and J. Widom. Deriving production rules for incremental view maintenance. In VLDB, 1991."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989374"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31128-4_15"},{"key":"e_1_3_2_1_9_1","unstructured":"W. W. Eckerson. Data warehousing special report: Data quality and the bottom line. http:\/\/www.adtmag.com\/article. asp?id=6321 2002.  W. W. Eckerson. Data warehousing special report: Data quality and the bottom line. http:\/\/www.adtmag.com\/article. asp?id=6321 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Oakland unified makes $7.6M accounting error in budget","author":"Grady B.","year":"2013","unstructured":"B. Grady . Oakland unified makes $7.6M accounting error in budget ; asking schools not to count on it. Oakland Local , 2013 . B. Grady. Oakland unified makes $7.6M accounting error in budget; asking schools not to count on it. Oakland Local, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223849"},{"key":"e_1_3_2_1_12_1","volume-title":"UNECE","author":"Hellerstein J.","year":"2008","unstructured":"J. Hellerstein . Quantitative data cleaning for large databases . UNECE , 2008 . J. Hellerstein. Quantitative data cleaning for large databases. UNECE, 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"ICSE","author":"Henderson P.","year":"1985","unstructured":"P. Henderson and M. Weiser . Continuous execution: The VisiProg environment . In ICSE , 1985 . P. Henderson and M. Weiser. Continuous execution: The VisiProg environment. In ICSE, 1985."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486827"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1888\/0333750888\/2215"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/29650.29654"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476793.1476813"},{"key":"e_1_3_2_1_18_1","volume-title":"CNN","author":"Kennedy B.","year":"2010","unstructured":"B. Kennedy . War games : Soviets, fearing Western attack, prepared for worst in \u201983 . CNN , 2010 . B. Kennedy. War games: Soviets, fearing Western attack, prepared for worst in \u201983. CNN, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.21"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2304510.2304517"},{"key":"e_1_3_2_1_21_1","volume-title":"System Safety and Computers","author":"Leveson N.","year":"1995","unstructured":"N. Leveson . Safeware : System Safety and Computers . Addison-Wesley , 1995 . N. Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995."},{"key":"e_1_3_2_1_22_1","volume-title":"ICASE, page 22","author":"Marinov D.","year":"2001","unstructured":"D. Marinov and S. Khurshid . TestEra: A novel framework for automated testing of Java programs . In ICASE, page 22 , 2001 . D. Marinov and S. Khurshid. TestEra: A novel framework for automated testing of Java programs. In ICASE, page 22, 2001."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1880172.1880176"},{"key":"e_1_3_2_1_24_1","volume-title":"ESEC\/FSE","author":"Mu\u00b8slu K.","year":"2013","unstructured":"K. Mu\u00b8slu , Y. Brun , M. D. Ernst , and D. Notkin . Making Offline Analyses Continuous . In ESEC\/FSE , 2013 . K. Mu\u00b8slu, Y. Brun, M. D. Ernst, and D. Notkin. Making Offline Analyses Continuous. In ESEC\/FSE, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384665"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988842.1988846"},{"key":"e_1_3_2_1_27_1","volume-title":"At the Abyss: An Insider\u2019s History of the Cold War","author":"Reed T. C.","year":"2004","unstructured":"T. C. Reed . At the Abyss: An Insider\u2019s History of the Cold War . Presidio Press , 2004 . T. C. Reed. At the Abyss: An Insider\u2019s History of the Cold War. Presidio Press, 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"American Medical News","author":"Robeznieks A.","year":"2005","unstructured":"A. Robeznieks . Data entry is a top cause of medication errors . American Medical News , 2005 . A. Robeznieks. Data entry is a top cause of medication errors. American Medical News, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007523"},{"key":"e_1_3_2_1_30_1","volume-title":"The Limits of Safety: Organizations, Accidents, and Nuclear Weapons","author":"Sagan S. D.","year":"1995","unstructured":"S. D. Sagan . The Limits of Safety: Organizations, Accidents, and Nuclear Weapons . Princeton University Press , 1995 . S. D. Sagan. The Limits of Safety: Organizations, Accidents, and Nuclear Weapons. Princeton University Press, 1995."},{"issue":"3","key":"e_1_3_2_1_31_1","first-page":"29","article-title":"Errors in building and using electronic tables: Financial consequences and minimisation techniques","volume":"17","author":"Sakal M.","year":"2012","unstructured":"M. Sakal and L. Rakovi\u00b4c . Errors in building and using electronic tables: Financial consequences and minimisation techniques . Strategic Management , 17 ( 3 ): 29 \u2013 35 , 2012 . M. Sakal and L. Rakovi\u00b4c. Errors in building and using electronic tables: Financial consequences and minimisation techniques. Strategic Management, 17(3):29\u201335, 2012.","journal-title":"Strategic Management"},{"key":"e_1_3_2_1_32_1","volume-title":"Controlling the information flow in spreadsheets. CoRR, abs\/0803.2527","author":"Samar V.","year":"2008","unstructured":"V. Samar and S. Patni . Controlling the information flow in spreadsheets. CoRR, abs\/0803.2527 , 2008 . V. Samar and S. Patni. Controlling the information flow in spreadsheets. CoRR, abs\/0803.2527, 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250770"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/LIVE.2013.6617344"},{"key":"e_1_3_2_1_35_1","volume-title":"JPL","author":"Stephenson A. G.","year":"1999","unstructured":"A. G. Stephenson Mars Climate Orbiter Mishap Investigation Board: Phase I Report . JPL , 1999 . A. G. Stephenson et al. Mars Climate Orbiter Mishap Investigation Board: Phase I Report. JPL, 1999."},{"key":"e_1_3_2_1_36_1","volume-title":"Principles of database and knowledge-base systems","author":"Ullman J. D.","year":"1988","unstructured":"J. D. Ullman . Principles of database and knowledge-base systems , Vol. I . Computer Science Press, Inc. , 1988 . J. D. Ullman. Principles of database and knowledge-base systems, Vol. I. Computer Science Press, Inc., 1988."},{"key":"e_1_3_2_1_37_1","volume-title":"Washington Post","author":"Wilson G. C.","year":"1980","unstructured":"G. C. Wilson . Computer errs, warns of Soviet attack on U.S . Washington Post , 1980 . G. C. Wilson. Computer errs, warns of Soviet attack on U.S. Washington Post, 1980."},{"key":"e_1_3_2_1_38_1","volume-title":"Chicago Tribune","author":"Yates J.","year":"2005","unstructured":"J. Yates . Data entry error wipes out life insurance coverage . Chicago Tribune , 2005 . J. Yates. Data entry error wipes out life insurance coverage. Chicago Tribune, 2005."}],"event":{"name":"ESEC\/FSE'13: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Saint Petersburg Russia","acronym":"ESEC\/FSE'13"},"container-title":["Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491411.2494580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491411.2494580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:42Z","timestamp":1750231722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491411.2494580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,18]]},"references-count":37,"alternative-id":["10.1145\/2491411.2494580","10.1145\/2491411"],"URL":"https:\/\/doi.org\/10.1145\/2491411.2494580","relation":{},"subject":[],"published":{"date-parts":[[2013,8,18]]},"assertion":[{"value":"2013-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}